>>>>> "Geir" == Geir Magnusson writes:
Dan> I've
Dan> never tried that, but Geir is right, I think it can be done if
Dan> you try hard enough.
>> In the second case, when there is a security manager, then, no, you
>> cannot get around the access controls, even with reflection.
Geir> Why would I have to "get around" the access controls? I'm the VM. I
Geir> can do magic things, right? (I should be able to...)
I thought we were talking about malicious user code.
Tom